Sei sulla pagina 1di 21

INDEX

I.Abstract I

II.List of Figures II

III.Abbreviations III

1. Introduction 1
1.1 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Brief Problem To Be Solved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 Sender Side Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 Receiver Side Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.4 Organization of report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

2. Literature Survey 5
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Existing Methodologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

3. Problem Statement and Objective 7


3.1 Problem Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1 System Architecture And Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.1.1 Working . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

4. Applications 10

5. Results and Interpretations 12

6. Conclusion and Future Scope 15


6.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
6.2 Future scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

References 16
ABSTRACT

A visual cryptography is a kind of secret sharing technique which allows the encoding of
a secret image into n number of shares distributed to participants. The beauty of such a
scheme is that a set of qualified participants is able to recover the secret image without any
cryptographic knowledge and computation devices.

Now a days hackers are trying to hack the data which is being transmitted on two or more
different machines over the network. For example, at the time of data transmission between
two armed force stations, it can be hacked by terrorists, spies and foes.

Cryptography is an imperative framework utilized for these kind of reasons. There are dif-
ferent sorts of calculations accessible for encryption and unscrambling of information i.e. De-
cryption and new calculations or algorithms are advancing.

In this system, a safe information transmission method utilizing visual cryptography has been
proposed. Here, the content information are encoded utilizing Tiny encryption calculation and
each one of those information are hide behind the image utilizing image Steganography.

The resultant stego-image is separated into N number of shares utilizing visual cryptography.
At that point, the shares are sent to the recipient where it utilizes the reverse procedure of
encryption to get the real content information.

The main aim of this paper is to design the enhanced secure algorithm which uses both
steganography using Genetic Algorithm and Visual Cryptography to ensure improved security
and reliability.

Keywords-TEA; Steganography; Visual Cryptography; Security

I
LIST OF FIGURES

Fig. No. Name of Figure Page No.


1 illustration of Visual Cryptography 1
2 Sender Side Process 3
3 Receiver Side Process 3
4 System Architecture 9
5 Flow chart 10
6 Original Secret Image 14
7 Image for Steganography 14
8 Reduced Values of Pixels for (C, M, Y) 15
9 Cover Images for Visual Cryptography 15
10 Share Images for Visual Cryptography 16
11 Stacked Image of Shares 16

II
ABBREVIATIONS

Abbreviations Long Form


TEA Tiny Encryption Algorithm
LSB Least Significant Bit
CT Cipher Text
ETA Encrypted Data
DTA Decrypted Data

III
Data Transmission Using Visual Cryptography T121024265

CHAPTER 1
INTRODUCTION

Nowadays, in the Internet, besides text, multimedia information is also quite prevalent. There-
fore the security of these secret and confidential images is a valid concern. To answer these
concerns, in 1994, Adi Shamir and Moni Naor at EUROCRYPT, proposed a new domain of
cryptography, known as visual cryptography . Visual cryptography is a unique kind of cryp-
tography which is used to encrypt printed texts, handwritten notes and pictures such that the
decryption can be done only by the human visual system. Visual cryptography scheme elim-
inates complex computation problem at the decryption the secret images can be restored by
stack operation. In the visual secrete sharing scheme an image is split into n number of shares.
When all n shares are combining, the original image would appear. While n-1 share does not
provide the information about original image so someone with all n shares.
This unique property of visual cryptography makes decryption process unattainable even
with the help of a brute force attack, as it requires a constant human intervention to check
whether the decoded image is valid or not.Visual cryptography, derived from the basic theory
of secret sharing, extends the same sharing scheme to images in such a way that no single share
reveals information about the original image. It finds its applications in sharing multimedia
information secrets over the network.

Fig 1: illustration of Visual Cryptography

Department of Computer Engineering 1 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

1.1 Objective

With rapid development in internet technology, different types of information can be trans-
ferred over internet. Hence there are security issues associated with transmitting high value as-
sets like commercial data, user personal information, banking or transaction data, data related
to military. Security of such data transfer must be taken into consideration because hacker can
use various methods and steal such high value assets which results in high monetary, social,
personal loss. Various schemes are developed to protect such high value assets. Visual cryptog-
raphy was developed in 1994 by Naor and Shamir. This method is developed to eliminate the
use of decryption key in secure information transformation. In visual cryptography, decryption
is done by human visual system and in proposed system decryption key is also used. Since
attackers, hackers were able to get data even from that stego-image, we are going to use en-
cryption key and decryption key as well with the help of TEA. In visual cryptography original
image is divided into three parts called as shares. The n-1 share doesnt give any information
about original image. When the shares are superimposed together then we can see original
image.

1.2 Brief Problem To Be Solved

The visual cryptography happened at two ends those are nothing but sender side and receiver
side. In this proposed system, there are three security levels has been used to users data (1)
Encrypt the information with the help of TEA (2) Store that data behind stego-image using LSB
(3) Divide that image into three shares. Following is the process going to happen at sender side
and user side:

1.2.1 Sender Side Process

In the client side firstly, data is encrypted using tiny encryption algorithm. In second level,
encrypted data will hide behind secret image using LSB (Least significant Bit) Steganography
and at third level using visual cryptography to divide that image into 3 numbers of shares.
These 3 shares are sending to the server.

Department of Computer Engineering 2 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

Fig 2: Sender Side Process

In the block diagram, sender will send the data in type of plain content thus, before send
this data over web. It will experiences the 3 levels of the security in which in the first place,
it is scrambled (encrypted) through the tiny encryption algorithm utilizing 128 bit key then,
it will changed over into cipher text CT1, second level of security is Steganography, in this
encoded information i.e. cipher text will hide behind the image using LSB Steganography and
this encryption will produce cipher text. Third level of security is that, they again encrypted
through the visual cryptography so image, in which encrypted data is hide will be divide into
3 shares.

1.2.1 Receiver Side Process

Figure the block diagram of for receiver side process, at the receiver side receiver will receive
the 3 level of shares and stack the 3 shares that known as decryption of visual cryptography. The
image is reveal after the proper stacking. The cipher text is the image on which the encrypted
data is hiding then, extract the encrypted data from the image, that known as the Steganalysis.

Fig 3: Receiver Side Process

Through the decryption process of Steganography the cipher text will remain. Using TEA de-
cryption algorithm and get back the original data. Here, receiver will be a server of authenticate
website. Using this process, that will provide the confidentiality to the sender and receiver.

Department of Computer Engineering 3 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

1.3 Motivation

All the systems around the world are to be used together in the important time of a nanosecond
even when installed across continents and oceans. This is possible only through networks. It
is in this context that networks become crucial to the feasibility of science and engineering re-
search. The unprecedented growth of networking has helped in breaking all geographic barriers
of the world and building the information super highway and global village. In this direction
a new technology has developed in the past few years which make it possible to interconnect
many disparate networks and make them work as a co-coordinated unit. Thus the technology
is designed to foster the communication between 2 machines with hardware architectures, to
accommodate and use any packet switched network hardware and to accommodate multiple
operating systems. It is in this context that Visual Cryptography has gained importance for
communications between disparate networks. In the public domain the threat of an intruder
accessing secret information has been an ever existing concern for the data communication.
Steganography, Cryptography, and Visual cryptography are the most widely used techniques
to overcome these threats.

1.4 Organization of report

Till this point the report give motivation, problem statement, objective and scope of the system.
Chapter 2 gives the literature survey of various techniques for user authentication. Chapter 3
gives overview of system architecture. It also gives computational complexity issue. Chapter
4 gives application of the system. Chapter 5 compares various schemes and provides results.
Chapter 6 conclude the report and gives future scope.

Department of Computer Engineering 4 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

CHAPTER 2
LITERATURE SURVEY

2.1 Introduction

There exists many information hiding softwares in the market. Most of the softwares directly
hide the data in the image without making use of encryption algorithms. The data in the cur-
rent model is encoded directly to LSB of the image without making use of pixel modification.
So, the security level is very low in such models. The hidden data could easy recovered by
using steganalysis technique. Many steganalysis softwares are available in the market that can
easily crack such images and retrieve the confidential data. So, the current model could be en-
hanced to increase the security level and making it more reliable. There some other softwares
that make use of encryption techniques before encoding it to the image. Some of the encryp-
tion techniques commonly used in softwares are RSA algorithm, AES(Advanced Encryption
Standard) algorithm, DES(Data Encryption Standard), Triple DES, TEA(Tiny Encryption Al-
gorithm) and many more. This would certainly enhance the security levels from the previous
model but even this software follows the LSB based steganography which is under attack. The
RS steganalysis approach could now detect the hidden data stored at the LSB of the image thus
making the software become very difficult.

2.2 Existing Methodologies

1. Author - Ms. Selva Sangeetha S, Ms. Sharmila S and Ms. Kalaivani M


Paper Name- Secure Attribute Based Disruption-Tolerant Military Networks
Remarks- The authors have been proposed information recovery plan which depends on secure
property. There are additionally utilizing RSA calculation. The connection amongst customer
and server is not shared connection. There are hash based message verification is utilized as
a part of capacity hub to exhibit that how to apply proposed work and in distribution tolerant

Department of Computer Engineering 5 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

military system secret information manage by just authorized mobile node.

2. Author - Alekhya Orugonda and S.Rajan


Paper Name- Hiding the Military Secret Message by Reversible Data Hiding
Remarks- The creator has been proposed where it has utilized reversible information stowing
away. It doesnt permit the original image degradation compression area. The mystery infor-
mation is embedded and encoding message utilizing mystery key. This paper proposed military
mystery message strategy that restores the vital information that recoup the information from
original image.

3. Author - N. Angayarkanni and P. Palaniyammal


Paper Name- Secured Communication for MANETS in Military
Remarks- In incorporates MANETS i.e. mobile ad hoc network for this it expanding the in-
formation transmission security. MANET is a safe and dependable for defense communication
environment. With minimal redundancy, it increases reliability utilizing message transmission
through numerous ways. Here, in multiple path byzantine fault remove and its caused by the
colluding is incorporated in SMT protocol to give more secure information transmission.

4.Author - Dnyanda Namdeo Hire


Paper Name- Secured Wireless Data Communication
Remarks- An algorithm has been proposed in to exchange the data between two stations a solid
algorithm i.e. polyalphabetic substitution cipher algorithm is utilized to give the information
security in armed force station. Firstly information is encoded and it will transmit to the desti-
nation station where decoding is performed to get the plain content information.

Department of Computer Engineering 6 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

CHAPTER 3
PROBLEM STATEMENT AND OBJECTIVE

3.1 Problem Analysis

An effective and secure protection of sensitive information is the primary concerned in Com-
munication systems or network storage systems. Never the less, it is also important for any
information process to ensure data is not being tampered with. Encryption methods are one of
the popular approaches to ensure the integrity and confidentiality of the protected information.
However one of the critical vulnerabilities of encryption techniques is protecting the informa-
tion from being exposed. To address these reliability problems, especially for large information
content items such as secret images (satellite photos or medical images), an image secret shar-
ing schemes (SSS) is a good alternative to remedy these types of vulnerabilities. With the rapid
advancement of network technology, multimedia information is transmitted over the Internet
conveniently. While using secret images, security issues should be taken into consideration
because hackers may utilize weak link over communication network to steal information that
they want. To deal with the security problems of secret images, various image secret sharing
schemes have been developed.
The base of protected communication among users using insecure channel is known as
cryptography. In order for cryptographic security to take place, an algorithm is involved for the
practice of encrypting and decrypting messages
In its basic form, one image is split into two separate images called shares. When the shares
are stacked on top of each other, the unique image is retrieved
A general n out of n visual cryptography scheme involves n participants in which a secret
image is split into n random looking shares and all n shares are required to recover the original
image.

Department of Computer Engineering 7 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

3.1 System Architecture And Design

Fig 4:System Architecture

As already said, the whole process of visual cryptography is done at two ends i.e. sender end
and receiver end. At sender side, the very first step is to convert confidential data (which is to
be transmit) into the cipher text using TEA algorithm. With TEA algorithm, the information
converted into cipher text is divided into two parts i.e. left part and right part. Then this cipher
text is hidden behind the one image with steganography using LSB(Least Significant Bit) and
this image is nothing but called as stego-image. In this stego-image, one bit of byte is used to
hide the cipher text. After this, stego-image is divided into three shares using visual cryptog-
raphy and with the help of wireless channel these shares of image send to the receiver end. At
receiver end, user overlaps the all shares of stego-image together. After overlapping and with
steganalysis receiver gets a stego-image. Then receiver uses TEA decryption algorithm to get
information which is hidden behind the stego-image.

Fig 5: Flow chart

Department of Computer Engineering 8 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

3.1.1 Working

1]First step is, to take plain image and information which is to hide.

2]Second step is, convert that information into cipher text using TEA algorithm.

3]Third step is, hide cipher text behind image using steganography.

4] Fourth step is, make 3 shares of stego-image and send those shares with wireless channel to
receiver end.

5] Fifth step is, at receiver end, overlap shares of image together and using steganalysis get
stego-image.

6] Sixth step is, get encrypted data and using TEA decryption algorithm decrypt data.

7] Seventh step is, finally display the original confidential data.

Department of Computer Engineering 9 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

CHAPTER 4
APPLICATIONS

There are wide variety of applications of visual cryptography. Following are the some of the
applications:

1.Secure Banking Communication:


A core banking system, there is a chance of encountering forged signature for transaction. And
in the net banking system, the password of customer may be hacked and misused. Thus secu-
rity is still a challenge in these applications. In a scheme is proposed for securing the customer
information and to prevent the possible forgery of password hacking. The concept of image
processing, in visual cryptography is used.
2.Defense System:
Visual Cryptography Scheme is an encryption method that uses combinational techniques to
encode secret written materials. This can be very useful in defense system to protect very sen-
sitive data, when data like password or any code is to transferred from one place to another
that secret data can be it can hidden in cover image, the share of the image is to be converted
into shares. Those multiple shares can be kept with multiple partners. Any one partner cannot
retrieve the secret code from the single share he has, all the shares from all the partners are
required to retrieve secret information hidden in the image. Thus data is safe in hands all the
partner.
3.Anti-Phishing Systems:
Anti phishing system can be one of the application of Visual Cryptography. Phishing websites
aims to steal sensitive and personal information such as passwords, credit cards numbers, pins,
etc. They trick customers by making identical web site to a real one where the customer sub-
mits his information. The work of solves this problem by using visual cryptography technique.
The customer can ensure if this is the genuine web site or not by typing his user name. The
server will send a share from its database. The client superimpose his own share with the one
sent by the site to ensure this is not phishing web page and then user can type the information.

Department of Computer Engineering 10 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

4.Watermarking:
Watermarking is another application area of Visual Cryptography. The scheme in explains the
use of visual cryptography in watermarking which composes of two phases: the watermark
embedding and watermark retrieving. During the watermark embedding phase, a watermark is
split into two shares by means of visual cryptography. Then, one of the two shares is embedded
into the frequency domain of the host image, and the other is distributed to the owner. To prove
the ownership, the owner has to address his/her share, extract the other share from the image
and then combine these two shares to reveal the watermark. Based on the security condition of
visual cryptography, we can make sure that the two shares cannot leak any information about
the watermark.
5.Signature Based Authentication using Contrast Enhanced Hierarchical Visual Cryp-
tography:
Employee System can be prevented by using authentication system based on visual cryptogra-
phy .Here authentication can be done using shares to prevent the systems from some attacks
such as brute force attack. Any institute can be considered as an application. Firstly, employees
will register in the system, the signature of the employee is scanned and entered in the system
to get its key share this key is printed on a card and given to the employee and the simple share
is entered to the system database. During authentication, the employee inserts his own card in
the card reader mounted in the entrance to read the key share from the card and superimposes
over the corresponding simple share available in the database.

Department of Computer Engineering 11 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

CHAPTER 5
RESULTS AND INTERPRETATIONS

5.1 User Data Encryption with TEA, Steganography and Visual cryptography

At The client side user data firstly encrypted using tiny encryption algorithm. In tiny encryption
algorithm it uses feistel structure and at a time 64 bit block of data is encrypted firstly it will
divide the 64 bit data into 2 halves of 32 bit i.e. left and right. TEA using 128 bit key to
encrypt data that divided into 4 sub keys of 32 bit. It contains 32 cycle and 64 rounds and 1
cycle contains 2 rounds. In the screenshot contains the encrypted data. Here, in this technique
we have use flower images as shown in Figure below to create the confusion. During the
transmission if any hacker will get the shares of images then that shares are meaningless for
them.

Fig 6: Original Secret Image

After encrypting data, these encrypted data hide behind the image using Steganography as
shown in Figure below. There are image Steganography is used to hide the data.

Fig 7: Image for Steganography

Department of Computer Engineering 12 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

Least Significant Bit (LSB) Steganography technique used to hide the text data at the least
significant bit of the pixel values and figure shows the image before hide the data and after hide
the data. Both images are looking same because data is hide at the LSB bit of the pixels so,
quality of the image is not affected too much so, before hiding and after hiding quality of the
images are not affected and they look similar.

Fig 8: Reduced Values of Pixels for (C, M, Y)

For the visual cryptography it will upload the image and divide embed image that hide en-
crypted data into 3 reduced color component value i.e. Cyan, Magenta and Yellow. Then 3
images i.e. Upload File: cover1.jpg, Upload File: cover2.jpg and Upload File: cover3.jpg use
as a cover image to hide the color components of the embed image as shown in figure. Here
image that hide the data is called as a embed image.

Fig.9: Cover Images for Visual Cryptography

Cover1 will hide the Cyan color component, Cover2 will hide the Magenta color Compo-
nent and Cover3 will hide the Yellow color Component and generate shares: share1, share2,
share3as shown in Figure below. These shares are sending to the server. This process provides
the confidentiality to the users data.

Department of Computer Engineering 13 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

Fig10: Share Images for Visual Cryptography

5.2 User Data Decryption at server side with Visual cryptography, Steganography and
TEA.

At the authenticate server side shares are stacked together as shown in Figure below and gen-
erate secret image that hide the encrypted data .

Fig11: Stacked Image of Shares

From the stacked image steganalysis perform to extract the encrypted data from the image and
that encrypted data is decrypted using TEA decryption. The original data of user is get back in
plain text form and save by the server or receiver.

Department of Computer Engineering 14 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

CHAPTER 6
CONCLUSION AND FUTURE SCOPE

6.1 Conclusion

The proposed system has discussed implementation of securely using least significant bit ma-
nipulation based steganography that uses the TEA algorithm along with visual cryptographic
technique. It can be concluded that when normal image security using steganographic and
visual cryptographic technique is applied, the decryption of the encoded authenticated data
becomes a cumbersome effort. The technique of steganography using visual cryptography in
images has its scope on transmission of data in highly secured manner through audio streams
and video streams. This is accomplished by encoding the audio data using steganography and
cryptography technique in the audio streams and adopting the same technique to send the data
in audio format, text format or image format in video streams. The technique in audio streams
and images is best utilized in sending the data in video streams. It can be concluded that when
normal image security using steganographic and visual cryptographic technique is applied, it
makes the task of the investigators unfeasible to decrypt the encoded secret message.

6.2 Future scope

The technique of steganography using visual cryptography in images has its scope on trans-
mission of data in highly secured manner through audio streams and video streams. This is
accomplished by encoding the audio data using steganography and cryptography technique in
the audio streams and adopting the same technique to send the data in audio format, text format
or image format in video streams. The technique in audio streams and images is best utilized
in sending the data in video streams. Although steganography has attracted great interests from
the military and government organizations, there is even a big interest shown from commercial
companies to safeguard their information from piracy.

Department of Computer Engineering 15 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

REFERENCES

1) ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=6508373

2) www.techrepublic.com/resource-library/whitepapers/integratingsteganographyusing-genetic-
algorithm-and-visual-cryptography-for-robustencryption-in-computer-forensics/

3)Dhiraj Pandey, Anil Kumar and Yudhvir Singh, 2013.Feature and Future of Visual Cryp-
tography Based Schemes, 9th International Conference, QShine 2013, Springer, LNICS, pp:
816-830

4) V. Tyagi, Data Hiding in image using least significant bit with Cryptograpgy, Interna-
tional journal of Advanced Research in computer science and software engineering (IJARC-
SSE), Volume2, Issue4, pp. 120-123, April 2012.

5) A Role-Based Trusted Network Provides, link: Pervasive Security and Compliance and
cisco.com, 2011.

6) S. Abdulla,New visual cryptography for colored image, Journal of computing, Vol-


ume2, Issue4, pp.21-25, April 2010.

7) asprs.org/a/publications/pers/2009journal/may/2009may557-567.pdf

8) N. Angayarkanni and P. Palaniyammal , Secured Communication for MANETS in Mil-


itary, IJCSET, Vol 3, Issue 9,318-323, September, 2013.

9) http://en.wikipedia.org/wiki/image hiding

10) Dnyanda Namdeo Hire, Secured Wireless Data Communication, International Jour-
nal of Computer Applications (0975-8887), Volume 54- No.1, September,2012

Department of Computer Engineering 16 Year 2016-17


Data Transmission Using Visual Cryptography T121024265

11) Ms. Selva Sangeetha S, Ms. Sharmila S and Ms. Kalaivani M, Secure Attribute Based
Disruption-Tolerant Military Networks International Journal For Advance Research In Engi-
neering And Technolog, Pp.7 , Volume 3, Issue III, March, 2015.

12) Alekhya Orugonda and S.Rajan , Hiding the Military Secret Message by Reversible
Data Hiding , International Journal of Engineering and Innovative Technology (IJEIT),Volume
3, Issue 4, October, 2013.

13) Priyanka Mehkare and Prof. Mayur Dhait , A Survey on Security in Data Sharing Ap-
plication For Decentralized Military, International Journal on Recent and Innovation Trends
in Computing and Communication Volume: 3 Issue: 10,Pp.5787 - 5790 , October, 2015. ISSN:
2321-8169.

14) Mythili Priya.U, Revathy.K, S.Rajeswari, Providing Internet Security by Detecting and
Preventing Phishing Page using Multi-Purpose browser ,The international daily journal, ISSN
2278-5469, pp.257-263,2015.

Department of Computer Engineering 17 Year 2016-17

Potrebbero piacerti anche